4.7 Article

Secrecy-Enhancing Design for Cooperative Downlink and Uplink NOMA With an Untrusted Relay

Journal

IEEE TRANSACTIONS ON COMMUNICATIONS
Volume 68, Issue 3, Pages 1698-1715

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCOMM.2019.2960345

Keywords

Non-orthogonal multiple access; physical layer security; untrusted relay; cooperative jamming; secrecy sum rate

Funding

  1. National Natural Science Foundation of China [61901313, 61971320, 61771366, 61601347]
  2. Office of China Postdoctoral Council
  3. China Postdoctoral Science Foundation [2019M650258]
  4. open research fund of National Mobile Communications Research Laboratory, Southeast University [2020D07]
  5. Natural Sciences and Engineering Research Council of Canada [RGPIN-2018-06307]
  6. UK Engineering and Physical Science Research Council [EP/P009719/2]
  7. H2020MSCA-RISE-2015 [690750]
  8. EPSRC [EP/P009719/2] Funding Source: UKRI

Ask authors/readers for more resources

We investigate a secrecy-enhancing design for cooperative downlink and uplink non-orthogonal multiple access (NOMA) transmissions with an untrusted relay. A source uses the NOMA principle to have downlink and uplink transmissions with a near user and a far user, and the communications between the source and the far user are aided by an untrusted relay. To minimize information leakage at the untrusted relay and achieve secure NOMA communications, adaptive downlink and uplink cooperative jamming schemes are proposed, where the far user in downlink and the near user in uplink adaptively emit a jamming signal to the untrusted relay to impair its eavesdropping capability. Both downlink and uplink jamming power are optimized to fully exploit the benefits of the proposed schemes for security enhancement. Then, for each scheme, we quantify the secrecy performance by deriving the ergodic secrecy sum rate lower bound and its scaling law. Finally, computer simulation is used to demonstrate the effectiveness of the proposed adaptive downlink and uplink cooperative jamming schemes and verify the accuracy of the derived analytical results.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available